[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20100205245A1 - Method for managing data transmission between peers according to levels of priority of transmitted and received data and associated management device - Google Patents

Method for managing data transmission between peers according to levels of priority of transmitted and received data and associated management device Download PDF

Info

Publication number
US20100205245A1
US20100205245A1 US12/658,126 US65812610A US2010205245A1 US 20100205245 A1 US20100205245 A1 US 20100205245A1 US 65812610 A US65812610 A US 65812610A US 2010205245 A1 US2010205245 A1 US 2010205245A1
Authority
US
United States
Prior art keywords
peer
data
priority level
blocks
transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/658,126
Other versions
US8219612B2 (en
Inventor
Nicolas Le Scouarnec
Mary-Luc Champel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Magnolia Licensing LLC
Original Assignee
Thomson Licensing
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing filed Critical Thomson Licensing
Assigned to THOMSON LICENSING reassignment THOMSON LICENSING ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHAMPEL, MARY-LUC, LE SCOUARNEC, NICOLAS
Publication of US20100205245A1 publication Critical patent/US20100205245A1/en
Application granted granted Critical
Publication of US8219612B2 publication Critical patent/US8219612B2/en
Assigned to MAGNOLIA LICENSING LLC reassignment MAGNOLIA LICENSING LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THOMSON LICENSING S.A.S.
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/1082Resource delivery mechanisms involving incentive schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass

Definitions

  • the invention relates to the transmission of data, possibly contents (possibly multimedia), in Peer-to-Peer (P2P) mode between peers (items of equipment) that can connect to at least one communication network.
  • P2P Peer-to-Peer
  • the invention relates to all the communication networks (or infrastructures), whether wired or wireless, capable of transmitting data that can be contents (possibly multimedia) between items of user equipment constituting peers. Therefore, this can be a wired network, such as a global network with medium or high bitrate data transmission lines, like for instance lines of the xDSL type (for “x Digital Subscriber Line”) or cables, or optical fibres, or even a wired Ethernet network, or a global wireless network, for example of the mobile (or cellular) type, or a wireless network of the local (or proximity) type (WLAN (“Wireless Local Area Network”—IEEE 802.11a, WiFi (802.11g), ETSI HiperLAN/2), WiMAX (IEEE 802.16, ETSI HiperMAN), and Bluetooth standards).
  • WLAN Wireless Local Area Network
  • WiFi 802.11g
  • WiMAX IEEE 802.16, ETSI HiperMAN
  • peer any type of equipment that can exchange data with other peers or items of network equipment, in peer to peer (or P2P) mode, in that it comprises at least one executable P2P type communication application, such as for example a video stream broadcast application (for example a Video on Demand (VoD) application).
  • a video stream broadcast application for example a Video on Demand (VoD) application
  • this can be, for example, a fixed or portable computer, a fixed or mobile (or cellular) telephone, a personal digital assistant (or PDA, including a “pocket PC”) a content receiver (such as, for example, a decoder, a residential gateway or a STB (Set-Top Box)).
  • content is understood here to mean a set of data that defines a television or video or audio programme (radio or musical) or games or multimedia, or an electronic file (or data).
  • a P2P application may be pressed to recover data as it will soon have need of it to continue to operate correctly.
  • a high priority level can be associated with the requests that it transmits, while the requests relating to data that will be used later are associated with at least one lower priority level.
  • reciprocal incentive mechanism such as for example a “tit for tat” type mechanism (reciprocity known as direct reciprocity) or of reputation type (reciprocity known as indirect reciprocity).
  • the tit for tat mechanism consists in authorizing a first peer to recover N blocks of data according to a given priority level from a second peer, provided that this first peer commits to transmit to the second peer N blocks of data according to this same given priority level if it makes the request. If subsequently the first peer refuses to transmit N blocks of data according to the given priority level of the second peer, then this latter ceases all cooperation with the first peer, so as to penalise it for its lack of cooperation.
  • This mechanism is notably used by the P2P application Bittorent and described in the document by Brahm Cohen “Incentives build robustness in Bittorent”, P2P Econ 2003.
  • the reputation mechanism consists in associating with each peer a virtual type monetary or confidence value, that varies over time according to its behaviour in terms of data transmission. The more a peer uses requests associated with a high priority level, the more its virtual monetary or confidence value is reduced and therefore the less it will be able to use new requests associated with a high priority level. Conversely, the more a peer transmits to other peers data associated with a high priority level, the more its virtual monetary or confidence value is increased.
  • the purpose of the invention is therefore to improve the situation, and more specifically to preserve the usefulness of priority levels within a P2P environment in the presence of a reciprocity mechanism.
  • the invention first proposes a method, dedicated to the management of data transmission in peer to peer mode between peers that can connect to at least one communication network, each transmission being carried out by a peer, following the reception of a request from another peer, according to a selected reciprocity mechanism.
  • This method is characterized in that it consists, when a peer wants to receive from another peer N blocks of data according to a first priority level X k selected in a set of at least two different priority levels, in assigning to this peer an exchange value that equals a number M of blocks of data to be transmitted to at least one other peer according to a second priority level X k′ selected in this set, M being equal to N*m kk′ , where m kk′ is a predetermined value function of the first X k and second X k′ selected priority levels.
  • the method according to the invention can comprise other characteristics that can be taken individually or in combination, and notably:
  • the invention also proposes a device dedicated to the management of data transmissions in peer to peer mode by a peer (in which runs at least one peer to peer type communication application and which is connected to at least one communication network), each transmission being carried out by this peer, following the reception of a request from another peer, according to a selected reciprocity mechanism.
  • This device is characterized by the fact that it is arranged, when its peer wants to receive from another peer N blocks of data according to a first priority level X k selected in a set of at least two different priority levels, to assign to its peer an exchange value equivalent to a number M of blocks of data to be transmitted to at least one other peer according to a second priority level X k′ selected in this set, M being equal to N*m kk′ , where m kk′ is a predetermined value function of the first X k and second X k′ selected priority levels.
  • the device according to the invention can comprise other characteristics that can be taken separately or in combination, and notably:
  • the invention also proposes a peer comprising at least one communication application of the peer-to-peer type and a device for the management of data transmission in peer to peer mode of the type of that presented above.
  • FIG. 1 shows in a very diagrammatic and functional way a P2P network constituted by peers, equipped with a management device according to the invention and connected to each other via a wired network,
  • FIG. 2 shows very schematically data exchanges between two peers according to the invention in the presence of a tit for tat type reciprocity mechanism adapted according to the invention
  • FIG. 3 shows very schematically data exchanges between three peers according to the invention in the presence of a tit for tat type reciprocity mechanism adapted according to the invention
  • FIG. 4 shows very schematically data exchanges between two peers according to the invention and a data server in the presence of a tit for tat type reciprocity mechanism adapted according to the invention.
  • the purpose of the invention is to enable the transmission of data in peer to peer (or P2P) mode between peers of a constituted P2P network via at least one communication network.
  • the (communication) network is a global wired network (for example of ADSL type) for example providing access to the Internet (IP—“Internet Protocol”) and ensuring connectivity between all the peers (equipment) of a P2P network.
  • the invention is not limited to this type of communication network. It relates in fact to all types of communication networks (or infrastructures) having at least an access network, wired and/or wireless, and capable of transmitting contents data (possibly multimedia) between peers (equipment). Therefore, the access network can be a wired network, such as a cable or optical fibre or Ethernet network, or a wireless network, such as a mobile (or cellular) network or a local area network (WLAN, WiMAX and Bluetooth standards).
  • a wired network such as a cable or optical fibre or Ethernet network
  • a wireless network such as a mobile (or cellular) network or a local area network (WLAN, WiMAX and Bluetooth standards.
  • the peers (equipment) (Pj) are fixed or portable computers, fitted with at least one executable P2P type communication application (A).
  • A executable P2P type communication application
  • the invention is not limited to this type of peer equipment. It concerns in fact any type of equipment capable of exchanging data with other peers or items of network equipment, via at least one communication network (or infrastructure). It can therefore also relate to fixed or mobile (or cellular) telephones, personal digital assistants (or PDAs, including “pocket PCs”), content receivers (such as for example decoders, residential gateways or STBs (‘Set-Top Boxes’)), for example.
  • the data transmitted between peers are video type contents, and that this transmission is made in the context of a video on demand (or VoD) service.
  • the invention is not restricted to this data type, nor to this service (or application) type. It relates in fact to any data type, and particularly to content data (television programme or video or audio (radio or musical) or games or multimedia, or computer (or “data”) files), and any service enabling the provision of data to at least one P2P communication application requiring (at least two) data transmission priority levels.
  • a peer to peer (or P2P) network is schematically illustrated in FIG. 1 constituted of peers Pj (here they are computers) capable of exchanging between each other content data via their communication means (such as for example modems) and via at least a first communication network R.
  • the index j here takes values comprised between 1 and 4, but it can take any value comprised between 1 and P, with P greater than or equal to 2.
  • the data (here contents) that are exchanged between peers Pj within the P2P network are for example from at least one data server SC (here in the context of a video on demand broadcast service).
  • This service can for example be controlled by the data server SC, connected to the (communication) network R. But, it can be controlled by another server, for example a services server, coupled to the data server SC and connected to the (communication) network R, or by a system distributed over the set of peers Pj (each peer Pj thus committing to generate part of the information relating to the service).
  • the invention proposes notably a management method enabling data (here contents) to be transmitted in peer to peer mode between peers Pj, in the presence of priority levels and a reciprocity mechanism.
  • Each transmission carried out by a peer Pj is made following the reception of a request that issues from another peer Pj′ (j′ ⁇ j) and according to a selected reciprocity mechanism, such as for example a tit for tat (direct reciprocity) type mechanism, or a reputation (indirect reciprocity) type mechanism.
  • a selected reciprocity mechanism such as for example a tit for tat (direct reciprocity) type mechanism, or a reputation (indirect reciprocity) type mechanism.
  • the method according to the invention is implemented each time a first peer Pj wants to receive from a second peer Pj′ N blocks of data according to a first priority level X k that is selected in a set of at least two different priority levels.
  • a first peer Pj wants to recover data from a second peer Pj′ when the first peer Pj generates a data recovery request intended for the second peer Pj′.
  • an exchange value that equals a number M of blocks of data to be transmitted to at least one other peer Pj′ or Pj′′ (j′ ⁇ j′′ ⁇ j) according to a second priority level X k′ selected in the aforementioned set, is assigned to a first applicant peer Pj. It is noted that the first X k and second X k′ selected priority levels can be identical or different.
  • the number M is equal to N*m kk′ , where m kk′ is a predetermined value that is a function of the first X k and second X k′ priority levels that were selected.
  • M is the number of blocks to be transmitted in exchange so that the reputation of a peer remains unchanged (constant). It is in fact only possible to immediately transmit part of M blocks as it can not be done otherwise at the considered instant, which causes a momentary reduction in the reputation.
  • This assigning of an exchange value can for example be carried out by a data transmission management device D according to the invention that is part of the applicant peer Pj (as illustrated in a non-restrictive manner), or that is coupled with this latter (Pj).
  • each management device D can be implemented in the form of software modules. But, it can also be implemented in part or entirely in the form of electronic circuits (hardware) or in a combination of software modules and electronic circuits.
  • This (management) device D can for example analyze messages (particularly requests) that are generated and received by the peer Pj with which it is associated and that relate to the locally related P2P application A, in order to proceed to the assignment of an exchange value when it detects that its peer Pj wants to recover data from at least one other peer Pj′, or that its peer Pj has transmitted data to another peer Pj′. It will also, preferably, monitor the actions of other peers Pj′ in order to ensure that they are acting normally and to perform its calculations according to these actions.
  • the exchange value type that is assigned to an applicant peer Pj depends on the reciprocity mechanism type that is implemented within the P2P network.
  • the exchange value can be equal to the number M of blocks of data that the applicant peer Pj commits to transmit to at least one other peer Pj′ according to the second priority level selected X k′ in exchange for the reception of N blocks of data according to the first priority level selected X k .
  • variables a, b and c are numbers strictly greater than 1. It will be noted that these variables a, b and c can be identical or different values according to the requirements of the P2P network considered.
  • the result of this correspondence table example is that the peers Pj are all the more penalised as they use high priority levels, such as for example X 1 and X 4 , to recover data.
  • the level of penalisation can be as high as you like, as it depends directly on the values that are assigned to a, b and c.
  • FIGS. 2 to 4 three different examples of data recovery in the presence of a tit for tat type mechanism adapted according to the invention are schematically represented.
  • Its device D that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 5*b blocks so that it commits to transmit to the peer P 4 , in exchange, 5*b blocks according to the priority level X 2 .
  • this decision can be imposed by a request received from the peer P 4 and requesting data according to the priority level X 2 .
  • the peer P 4 transmits the 5 requested blocks' to the peer P 2 according to the priority level X 1 (arrow F 1 in FIG. 2 ).
  • the peer P 2 transmits to the peer P 4 5*b blocks according to the priority level X 2 (arrow F 2 in FIG. 2 ).
  • the device D of the peer P 2 that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 10/b blocks so that it commits to transmit to the peer P 1 , in exchange, 10/b blocks according to the priority level X 1 . It will be noted that this decision can be imposed by a request received from the peer P 1 and requesting data according to the priority level X 1 .
  • the peer P 4 On reception of the request from the peer P 2 , the peer P 4 transmits the 10 requested blocks to the peer P 2 according to the priority level X 2 (arrow F 1 in FIG. 3 ). A little later or noticeably simultaneously, to the request of the peer P 1 , the peer P 2 transmits to the peer P 1 10/b blocks according to the priority level X 1 as an exchange for what it has received from the peer P 2 (arrow F 2 in FIG. 3 ). The peer P 1 must then transmit in its turn blocks to the peer P 4 in exchange for that which it has received from the peer P 2 according to the priority level X 2 .
  • this decision can be imposed by a request received from the peer P 4 and requesting data according to the priority level X 2 .
  • the peer P 1 transmits to the peer P 4 10 blocks according to the priority level X 2 (arrow F 3 in FIG. 3 ).
  • the device D of the peer P 4 that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 20*(c*b*a) blocks so that it commits to transmit to the peer P 1 , in exchange, 20*(c*b*a) blocks according to the priority level X 3 .
  • the data server SC On reception of the request from the peer P 4 , the data server SC transmits the 20 requested blocks to the peer P 4 according to the priority level X 4 (arrow F 1 in FIG. 4 ). A little later or noticeably simultaneously, to the request of the peer P 1 , the peer P 4 transmits to the peer P 1 20*(c*b*a) blocks according to the priority level X 3 as an exchange for what it has received from data server SC (arrow F 2 in FIG. 4 ). The peer P 1 must then transmit in its turn blocks to data server SC in is exchange for that which it has received from the peer P 2 according to the priority level X 3 .
  • the device D of the peer P 1 decides, to assign to it an exchange value M equal to 20*(c*b*a) blocks so that it commits to transmit to the peer P 4 , in exchange, 20*(c*b*a) blocks according to the priority level X 3 .
  • this decision can be imposed by a request received from the peer P 4 and requesting data according to the priority level X 3 .
  • the peer P 1 transmits to the data server SC 20*(c*b*a) blocks according to the priority level X 3 (arrow F 3 in FIG. 4 ).
  • the blocks that are transmitted to the data server SC can have no value (they are in fact essentially intended to prove that the peer P 1 acts in exchange for the service that was provided to it).
  • each peer Pj is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data
  • the exchange value can for example be subtracted from the current virtual monetary or confidence value of an applicant peer Pj in exchange for the reception of N blocks of data according to the first selected priority level X k .
  • a peer Pj does not owe exchange to one or several other specific peers Pj′ (those from which it has requested data), but to the set of the P2P network peers. Consequently, the current virtual monetary or confidence value of a peer Pj corresponds to the accumulation of exchange values that were successively assigned to this peer Pj in exchange for all the data that were transmitted to it by the other peers Pj′ on its request, but also in exchange for all the data that it has transmitted to the other peers Pj′ on their request.
  • the device D of a peer Pj that assigns an exchange value to its peer Pj each time that this latter (Pj) transmits data to another peer Pj′ on its request. Consequently, when a peer Pj transmits data to another peer Pj′ according to a requested priority level X k the device D of this peer adds to the current virtual monetary or confidence value of its peer Pj an exchange value that is a function of the number of blocks of data that its peer Pj has transmitted according to this requested priority level X k . This addition of exchange value is a sort of compensation.
  • the device D of a peer Pj can also store the current virtual monetary or confidence value of each peer Pj′ with which it exchanges blocks of data (or even of its P2P network).
  • the device D of a peer Pj that transmits data to another peer Pj′ on its request, can assign an exchange value to this other peer Pj′ when its peer Pj transmits data to it. More specifically, it removes from the virtual monetary or confidence value of this peer Pj′ (that it stores), the exchange value that is a function of the number of blocks of data that its peer Pj transmitted to it according to the requested priority level X k , in order to update this virtual value. Then, it can transmit to the other peers of its P2P network the virtual value that it has just updated. This is more particularly of interest when a reputation mechanism is being used.
  • the predetermined communication equipment to which a peer Pj must transmit data can be the data server SC. This is practical as this enables the time necessary for the making of a decision relative to the acceptation or refusal to transmit data of the data server SC to be reduced. But, this predetermined communication equipment can also be another peer Pj′ or a dedicated server that is connected to the communication network R.
  • At least five variants can be envisaged to determine if a peer is authorized or not to recover data from the data server SC. These five variants have a common initial first step but different final second steps.
  • the first step is triggered when the data server SC receives from a peer Pj a request asking it to transmit N blocks of data according to the priority level X 4 .
  • the data server SC can only proceed to this transmission on condition that the applicant peer Pj does not require this type of transmission too frequently.
  • the data server SC can maintain updated for each peer Pj the frequency according to which this peer Pj addresses data recovery requests to it.
  • the data server SC compares the current frequency of this peer Pj with a selected (frequency) threshold.
  • the second step uses the result of the comparison carried out during the first step.
  • the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. If the current frequency of the applicant peer Pj is greater than the selected threshold, then the data server SC does not satisfy the request of the peer Pj.
  • the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. But, if the current frequency of the applicant peer Pj is greater than the selected threshold, then not only does the data server SC not satisfy the request of the peer Pj but in addition it requires the banishment of the applicant peer Pj from the P2P environment.
  • the data server SC satisfies the request of the peer Pj whatever the current frequency of this peer Pj, and, if this current frequency is greater than the selected threshold, then the data server SC requires the banishment of the applicant peer Pj from the P2P environment.
  • the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. But, if the current frequency of the applicant peer Pj is greater than the selected threshold, then not only does the data server SC not satisfy the request of the peer Pj but in addition it informs the other peers Pj′ of the behaviour of this applicant peer Pj so that they modify their behaviour with respect to it.
  • the data server SC satisfies the request of the peer Pj whatever the current frequency of this peer Pj, and, if this current frequency is greater than the selected threshold, then the data server SC informs the other peers Pj′ of the behaviour of this applicant peer Pj so that they modify their behaviour with respect to it.
  • the invention is not restricted to embodiments of the management device, of the peer equipment and management method described above, provided only as a non-restrictive example, but includes all the variants that can be envisaged by those skilled in the art in the framework of the following claims.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method dedicated to the management of data transmission in peer to peer mode between peers (P1-P4) that can connect to a communication network (R), each transmission being carried out by a peer (P1), following the reception of a request from another peer (P2), according to a selected reciprocity mechanism. This method consists, when a peer (P2) wants to receive from another peer (P1) N blocks of data according to a first priority level Xk selected in a set of at least two different priority levels, in assigning to this peer (P2) an exchange value equivalent to a number M of blocks of data to be transmitted to at least one other peer (P1) according to a second priority level Xk′ selected in this set, M being equal to N*mkk′, where mkk′ is a predetermined value function of the first Xk and second Xk′ selected priority levels.

Description

    TECHNICAL DOMAIN OF THE INVENTION
  • The invention relates to the transmission of data, possibly contents (possibly multimedia), in Peer-to-Peer (P2P) mode between peers (items of equipment) that can connect to at least one communication network.
  • The invention relates to all the communication networks (or infrastructures), whether wired or wireless, capable of transmitting data that can be contents (possibly multimedia) between items of user equipment constituting peers. Therefore, this can be a wired network, such as a global network with medium or high bitrate data transmission lines, like for instance lines of the xDSL type (for “x Digital Subscriber Line”) or cables, or optical fibres, or even a wired Ethernet network, or a global wireless network, for example of the mobile (or cellular) type, or a wireless network of the local (or proximity) type (WLAN (“Wireless Local Area Network”—IEEE 802.11a, WiFi (802.11g), ETSI HiperLAN/2), WiMAX (IEEE 802.16, ETSI HiperMAN), and Bluetooth standards).
  • Moreover, it is understood here by “peer (item of equipment)” any type of equipment that can exchange data with other peers or items of network equipment, in peer to peer (or P2P) mode, in that it comprises at least one executable P2P type communication application, such as for example a video stream broadcast application (for example a Video on Demand (VoD) application). Therefore, this can be, for example, a fixed or portable computer, a fixed or mobile (or cellular) telephone, a personal digital assistant (or PDA, including a “pocket PC”) a content receiver (such as, for example, a decoder, a residential gateway or a STB (Set-Top Box)).
  • Finally, “content” is understood here to mean a set of data that defines a television or video or audio programme (radio or musical) or games or multimedia, or an electronic file (or data).
  • PRIOR ART
  • As those skilled in the art know, in a P2P environment, the correct operation of some applications depends heavily on the cooperation between peers, as it is the peers that contribute jointly to the broadcasting of data, particularly of contents. This is particularly the case for some P2P video stream broadcast applications, such as for example video on demand (or VoD). In this application type, a peer that wants to recover data that it has not yet received must transmit requests to one or several other peers, and a peer that receives such a request must, if it possesses the required data, transmit it to the peer that requested it.
  • At certain times, a P2P application may be pressed to recover data as it will soon have need of it to continue to operate correctly. In order to enable a peer to recover data that it will very shortly require more rapidly, a high priority level can be associated with the requests that it transmits, while the requests relating to data that will be used later are associated with at least one lower priority level.
  • The disadvantage incurred by an operating mode based on requests of variable priority levels, resides in the fact that some peers abuse or take advantage of requests associated with the highest priority level. These peers monopolize the network resources in order to be systematically served before the other peers, and therefore benefit from very favourable data obtaining conditions, to the detriment of other peers.
  • To avoid the aforementioned abuse, it is possible to implement a reciprocal incentive mechanism, such as for example a “tit for tat” type mechanism (reciprocity known as direct reciprocity) or of reputation type (reciprocity known as indirect reciprocity).
  • The tit for tat mechanism consists in authorizing a first peer to recover N blocks of data according to a given priority level from a second peer, provided that this first peer commits to transmit to the second peer N blocks of data according to this same given priority level if it makes the request. If subsequently the first peer refuses to transmit N blocks of data according to the given priority level of the second peer, then this latter ceases all cooperation with the first peer, so as to penalise it for its lack of cooperation. This mechanism is notably used by the P2P application Bittorent and described in the document by Brahm Cohen “Incentives build robustness in Bittorent”, P2P Econ 2003.
  • The main disadvantage of this tit for tat mechanism resides in the fact that the peers that do not abuse recoveries of data according to the highest priority level find themselves penalised, and therefore recover their data more slowly. They are then, in a way, incited to behave like those that abuse the highest priority level, so that rapidly a situation is attained where almost all the peers use the highest priority level which is the same as functioning without a priority level.
  • The reputation mechanism consists in associating with each peer a virtual type monetary or confidence value, that varies over time according to its behaviour in terms of data transmission. The more a peer uses requests associated with a high priority level, the more its virtual monetary or confidence value is reduced and therefore the less it will be able to use new requests associated with a high priority level. Conversely, the more a peer transmits to other peers data associated with a high priority level, the more its virtual monetary or confidence value is increased.
  • The main disadvantage of this reputation mechanism resides in the fact that the peers can agree to make the P2P environment believe that they effectively exchange data (whatever the priority level) that enables them to increase in an abusive way their virtual monetary or confidence value, which is relatively difficult to overcome
  • SUMMARY OF THE INVENTION
  • The purpose of the invention is therefore to improve the situation, and more specifically to preserve the usefulness of priority levels within a P2P environment in the presence of a reciprocity mechanism.
  • For this purpose, the invention first proposes a method, dedicated to the management of data transmission in peer to peer mode between peers that can connect to at least one communication network, each transmission being carried out by a peer, following the reception of a request from another peer, according to a selected reciprocity mechanism.
  • This method is characterized in that it consists, when a peer wants to receive from another peer N blocks of data according to a first priority level Xk selected in a set of at least two different priority levels, in assigning to this peer an exchange value that equals a number M of blocks of data to be transmitted to at least one other peer according to a second priority level Xk′ selected in this set, M being equal to N*mkk′, where mkk′ is a predetermined value function of the first Xk and second Xk′ selected priority levels.
  • The method according to the invention can comprise other characteristics that can be taken individually or in combination, and notably:
      • in the presence of a tit for tat type reciprocity mechanism, the exchange value can be equal to the number M of blocks of data that the applicant peer commits to transmit to at least one other peer according to the second priority level selected Xk′ in exchange for the reception of N blocks of data according to the first priority level selected Xk,
      • as a variant, in the presence of a “reputation” type reciprocity mechanism in which each peer is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data, the exchange value can be subtracted from the virtual monetary or confidence value of the peer in exchange for the reception of N blocks of data according to the first selected priority level Xk,
      • the set can comprise at least one high priority level X1, one normal priority level X2 and one low priority level X3,
        • the set can also comprise an additional priority level X4 that is associated with a transmission of blocks of data by the data server,
          • in the case of a request of a peer requesting the data server to transmit N blocks of data to it according to the additional priority level X4, the data server can only proceed to this transmission on condition that this applicant peer has previously transmitted data to a predetermined item of communication equipment, such as for example (and not restrictively) another peer, the data server or a dedicated server connected to the communication network,
          • in the case of a request of a peer requesting the data server to transmit N blocks of data according to the additional priority level X4, the data server can only proceed to this transmission on condition that this applicant peer requests this transmission type according to a frequency less than a selected threshold,
          • in a first variant, in the case of a request of a peer requesting the data server to transmit N blocks of data to it according to the additional priority level X4, the data server can determine the frequency according to which this applicant peer requests this transmission type, and, if this determined frequency is greater than a selected threshold, the data server can request the banishment of this applicant peer from the peer to peer environment,
          • in a second variant, in the case of a request of a peer requesting the data server to transmit N blocks of data to it according to the additional priority level X4, the data server can determine the frequency according to which this applicant peer requests this transmission type, and, if this determined frequency is greater than a selected threshold, the data server can alert the other peers of the behaviour of this applicant peer so that they modify their behaviour with respect to it,
            • the data server can for example proceed to the requested transmission whatever the determined frequency, or he can only proceed to the requested transmission if the determined frequency is less than the selected threshold.
  • The invention also proposes a device dedicated to the management of data transmissions in peer to peer mode by a peer (in which runs at least one peer to peer type communication application and which is connected to at least one communication network), each transmission being carried out by this peer, following the reception of a request from another peer, according to a selected reciprocity mechanism.
  • This device is characterized by the fact that it is arranged, when its peer wants to receive from another peer N blocks of data according to a first priority level Xk selected in a set of at least two different priority levels, to assign to its peer an exchange value equivalent to a number M of blocks of data to be transmitted to at least one other peer according to a second priority level Xk′ selected in this set, M being equal to N*mkk′, where mkk′ is a predetermined value function of the first Xk and second Xk′ selected priority levels.
  • The device according to the invention can comprise other characteristics that can be taken separately or in combination, and notably:
      • it can be arranged, in the presence of a tit for tat type reciprocity mechanism, to assign to its peer an exchange value equal to the number M of blocks of data that its applicant peer must transmit to at least one other peer according to the second priority level selected Xk′ in exchange for the reception of N blocks of data according to the first priority level selected Xk,
      • as a variant, it can be arranged, in the presence of a “reputation” type reciprocity mechanism in which each peer is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data, to subtract the exchange value from the virtual monetary or confidence value of its peer in exchange for the reception of N blocks of data according to said first selected priority level Xk,
      • it can be arranged to manage a set of priority levels that comprise at least one high priority level X1, a normal priority level X2 and a low priority level X3, as well as possibly an additional priority level X4 that is associated with a transmission of blocks of data by a data server,
        • it can be arranged, when its peer wants to request the data server to transmit to it N blocks of data according to the additional priority level X4, to command its peer to transmit prior to its transmission request, data to a predetermined item of communication equipment connected to a communication network.
  • The invention also proposes a peer comprising at least one communication application of the peer-to-peer type and a device for the management of data transmission in peer to peer mode of the type of that presented above.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Other characteristics and advantages of the invention will appear upon examination of the detailed description hereafter, and the annexed drawings, wherein:
  • FIG. 1 shows in a very diagrammatic and functional way a P2P network constituted by peers, equipped with a management device according to the invention and connected to each other via a wired network,
  • FIG. 2 shows very schematically data exchanges between two peers according to the invention in the presence of a tit for tat type reciprocity mechanism adapted according to the invention,
  • FIG. 3 shows very schematically data exchanges between three peers according to the invention in the presence of a tit for tat type reciprocity mechanism adapted according to the invention, and
  • FIG. 4 shows very schematically data exchanges between two peers according to the invention and a data server in the presence of a tit for tat type reciprocity mechanism adapted according to the invention.
  • The annexed drawings can be used not only to complete the invention, but also to contribute to its definition, if necessary.
  • DETAILED DESCRIPTION
  • The purpose of the invention is to enable the transmission of data in peer to peer (or P2P) mode between peers of a constituted P2P network via at least one communication network.
  • In what follows, it is considered in a non-restrictive manner that the (communication) network is a global wired network (for example of ADSL type) for example providing access to the Internet (IP—“Internet Protocol”) and ensuring connectivity between all the peers (equipment) of a P2P network. But, the invention is not limited to this type of communication network. It relates in fact to all types of communication networks (or infrastructures) having at least an access network, wired and/or wireless, and capable of transmitting contents data (possibly multimedia) between peers (equipment). Therefore, the access network can be a wired network, such as a cable or optical fibre or Ethernet network, or a wireless network, such as a mobile (or cellular) network or a local area network (WLAN, WiMAX and Bluetooth standards).
  • Moreover, it is considered in what follows, as a non-restrictive example, that the peers (equipment) (Pj) are fixed or portable computers, fitted with at least one executable P2P type communication application (A). But the invention is not limited to this type of peer equipment. It concerns in fact any type of equipment capable of exchanging data with other peers or items of network equipment, via at least one communication network (or infrastructure). It can therefore also relate to fixed or mobile (or cellular) telephones, personal digital assistants (or PDAs, including “pocket PCs”), content receivers (such as for example decoders, residential gateways or STBs (‘Set-Top Boxes’)), for example.
  • In addition, it is considered in what follows, as a non-restrictive example, that the data transmitted between peers are video type contents, and that this transmission is made in the context of a video on demand (or VoD) service. But, the invention is not restricted to this data type, nor to this service (or application) type. It relates in fact to any data type, and particularly to content data (television programme or video or audio (radio or musical) or games or multimedia, or computer (or “data”) files), and any service enabling the provision of data to at least one P2P communication application requiring (at least two) data transmission priority levels.
  • A peer to peer (or P2P) network is schematically illustrated in FIG. 1 constituted of peers Pj (here they are computers) capable of exchanging between each other content data via their communication means (such as for example modems) and via at least a first communication network R. The index j here takes values comprised between 1 and 4, but it can take any value comprised between 1 and P, with P greater than or equal to 2.
  • The data (here contents) that are exchanged between peers Pj within the P2P network are for example from at least one data server SC (here in the context of a video on demand broadcast service). This service can for example be controlled by the data server SC, connected to the (communication) network R. But, it can be controlled by another server, for example a services server, coupled to the data server SC and connected to the (communication) network R, or by a system distributed over the set of peers Pj (each peer Pj thus committing to generate part of the information relating to the service).
  • The invention proposes notably a management method enabling data (here contents) to be transmitted in peer to peer mode between peers Pj, in the presence of priority levels and a reciprocity mechanism.
  • Each transmission carried out by a peer Pj is made following the reception of a request that issues from another peer Pj′ (j′≠j) and according to a selected reciprocity mechanism, such as for example a tit for tat (direct reciprocity) type mechanism, or a reputation (indirect reciprocity) type mechanism.
  • The method according to the invention is implemented each time a first peer Pj wants to receive from a second peer Pj′ N blocks of data according to a first priority level Xk that is selected in a set of at least two different priority levels.
  • We are informed that a first peer Pj wants to recover data from a second peer Pj′ when the first peer Pj generates a data recovery request intended for the second peer Pj′.
  • It is considered in what follows, provided as a non-restrictive example, that the set comprises four (k=1 to 4) priority levels: a high priority level X1 (k=1), a normal priority level X2 (k=2), a low priority level X3 (k=3), and an additional priority level X4 (k=4) that is specifically associated with the transmission of blocks of data by the (one) data server SC at the explicit request of a peer Pj (in this case, the data server SC can also be considered as a peer, in particular if it concerns a peer (called a “seeder”) that has all the contents and therefore only serves other peers) and that is preferably the highest priority level. But, the invention is not restricted to this number of priority levels. It applies in fact whenever at least two priority levels are utilized.
  • Each time the aforementioned situation arises (generation of a data recovery request), an exchange value that equals a number M of blocks of data to be transmitted to at least one other peer Pj′ or Pj″ (j′≠j″≠j) according to a second priority level Xk′ selected in the aforementioned set, is assigned to a first applicant peer Pj. It is noted that the first Xk and second Xk′ selected priority levels can be identical or different. The number M is equal to N*mkk′, where mkk′ is a predetermined value that is a function of the first Xk and second Xk′ priority levels that were selected.
  • It is important to note that M is the number of blocks to be transmitted in exchange so that the reputation of a peer remains unchanged (constant). It is in fact only possible to immediately transmit part of M blocks as it can not be done otherwise at the considered instant, which causes a momentary reduction in the reputation.
  • This assigning of an exchange value can for example be carried out by a data transmission management device D according to the invention that is part of the applicant peer Pj (as illustrated in a non-restrictive manner), or that is coupled with this latter (Pj).
  • It will be noted that each management device D according to the invention can be implemented in the form of software modules. But, it can also be implemented in part or entirely in the form of electronic circuits (hardware) or in a combination of software modules and electronic circuits.
  • This (management) device D can for example analyze messages (particularly requests) that are generated and received by the peer Pj with which it is associated and that relate to the locally related P2P application A, in order to proceed to the assignment of an exchange value when it detects that its peer Pj wants to recover data from at least one other peer Pj′, or that its peer Pj has transmitted data to another peer Pj′. It will also, preferably, monitor the actions of other peers Pj′ in order to ensure that they are acting normally and to perform its calculations according to these actions.
  • The exchange value type that is assigned to an applicant peer Pj depends on the reciprocity mechanism type that is implemented within the P2P network.
  • For example, in the presence of a tit for tat type reciprocity mechanism, the exchange value can be equal to the number M of blocks of data that the applicant peer Pj commits to transmit to at least one other peer Pj′ according to the second priority level selected Xk′ in exchange for the reception of N blocks of data according to the first priority level selected Xk.
  • The different exchange values mkk′ can for example be stored by the device D in the form of a correspondence table that can be represented, as an example, in the form of the following table (that corresponds to request for recovery of a single (N=1) block of data—to know the exchange value for N blocks, it suffices to multiply mkk′ by N).
  • Exchange value Exchange value Exchange value
    mkk′ for mkk′ for mkk′ for
    commitment to commitment to commitment to
    transmission transmission transmission
    according to X1 according to X2 according to X3
    Reception of 1 not provided not provided of (c · b · a)
    block according for for blocks
    to X4 (from CS)
    Reception of 1 of 1 block of b blocks of (b · a) blocks
    block according
    to X1
    Reception of 1 of 1/b block of 1 block of a blocks
    block according
    to X2
    Reception of 1 of 1/(b · a) of 1/a block of 1 block
    block according block
    to X3
  • The variables a, b and c are numbers strictly greater than 1. It will be noted that these variables a, b and c can be identical or different values according to the requirements of the P2P network considered.
  • It is understood from the preceding correspondence table that:
      • if a peer Pj wants to receive from another peer Pj′ 1 block of data according to the priority level X1, then it must commit to transmit to at least one other peer Pj′ either 1 block of data according to priority level X1, or b blocks of data according to priority level X2, or again (b*a) blocks of data according to priority level X3,
      • if a peer Pj wants to receive from another peer Pj′ 1 block of data according to the priority level X2, then it must commit to transmit to at least one other peer Pj′ either 1/b block of data according to priority level X1, or 1 block of data according to priority level X2, or again a blocks of data according to priority level X3,
      • if a peer Pj wants to receive from another peer Pj′ 1 block of data according to the priority level X3, then it must commit to transmit to at least one other peer Pj′ either 1/(b*a) block of data according to priority level X1, or 1/a block of data according to priority level X2, or again 1 block of data according to priority level X3, and
      • if a peer Pj wants to receive from the data server SC 1 block of data according to the priority level X4, then it must commit to transmit to at least one other peer Pj′ (c*b*a) blocks of data according to the priority level X3.
  • The result of this correspondence table example is that the peers Pj are all the more penalised as they use high priority levels, such as for example X1 and X4, to recover data. The level of penalisation can be as high as you like, as it depends directly on the values that are assigned to a, b and c.
  • On FIGS. 2 to 4 three different examples of data recovery in the presence of a tit for tat type mechanism adapted according to the invention are schematically represented.
  • In the first example shown in FIG. 2, it is considered that the peer P2 has request from the peer P4 the transmission of 5 (N=5) blocks of data according to the priority level X1. Its device D, that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 5*b blocks so that it commits to transmit to the peer P4, in exchange, 5*b blocks according to the priority level X2. It will be noted that this decision can be imposed by a request received from the peer P4 and requesting data according to the priority level X2. On reception of this request, the peer P4 transmits the 5 requested blocks' to the peer P2 according to the priority level X1 (arrow F1 in FIG. 2). And a little later or noticeably simultaneously, to the request of the peer P4, the peer P2 transmits to the peer P4 5*b blocks according to the priority level X2 (arrow F2 in FIG. 2).
  • It will be noted that in order to ensure that another peer does not abuse it is possible, for example, to transmit to it a first block, then await the reception of b blocks, then transmit to it a second block, than again await the reception of blocks, so that the transmission between the peers concerned is as simultaneous as possible (and that the peer that abuses is sanctioned as quickly as possible).
  • In the second example shown in FIG. 3, it is considered that the peer P2 has requested from the peer P4 the transmission of 10 (N=10) blocks of data according to the priority level X2, but that it possesses data that are of interest only to the peer P1 and not the peer P4. The device D of the peer P2, that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 10/b blocks so that it commits to transmit to the peer P1, in exchange, 10/b blocks according to the priority level X1. It will be noted that this decision can be imposed by a request received from the peer P1 and requesting data according to the priority level X1. On reception of the request from the peer P2, the peer P4 transmits the 10 requested blocks to the peer P2 according to the priority level X2 (arrow F1 in FIG. 3). A little later or noticeably simultaneously, to the request of the peer P1, the peer P2 transmits to the peer P1 10/b blocks according to the priority level X1 as an exchange for what it has received from the peer P2 (arrow F2 in FIG. 3). The peer P1 must then transmit in its turn blocks to the peer P4 in exchange for that which it has received from the peer P2 according to the priority level X2. For example the device D of the peer P1, that uses the information from the preceding correspondence table, decides to assign to it an exchange value M equal to ((10/b)*b) blocks so that it commits to transmit to the peer P4, in exchange, 10 (10b/b =10) according to the priority level X2. It will be noted that this decision can be imposed by a request received from the peer P4 and requesting data according to the priority level X2. And a little later or noticeably simultaneously, to the request of the peer P4, the peer P1 transmits to the peer P4 10 blocks according to the priority level X2 (arrow F3 in FIG. 3).
  • In the third example illustrated in FIG. 4, it is considered that the peer P4 has requested from the data server SC the transmission of 20 (N=20) blocks of data according to the priority level X4 as the other peers of the P2P network did not possess them, but it possess data that is of interest only to the peer P1 and not to the data server SC. The device D of the peer P4, that uses the information from the preceding correspondence table, decides then, for example, to assign to it an exchange value M equal to 20*(c*b*a) blocks so that it commits to transmit to the peer P1, in exchange, 20*(c*b*a) blocks according to the priority level X3. On reception of the request from the peer P4, the data server SC transmits the 20 requested blocks to the peer P4 according to the priority level X4 (arrow F1 in FIG. 4). A little later or noticeably simultaneously, to the request of the peer P1, the peer P4 transmits to the peer P1 20*(c*b*a) blocks according to the priority level X3 as an exchange for what it has received from data server SC (arrow F2 in FIG. 4). The peer P1 must then transmit in its turn blocks to data server SC in is exchange for that which it has received from the peer P2 according to the priority level X3. For example the device D of the peer P1, that uses the information from the preceding correspondence table, decides, to assign to it an exchange value M equal to 20*(c*b*a) blocks so that it commits to transmit to the peer P4, in exchange, 20*(c*b*a) blocks according to the priority level X3. It will be noted that this decision can be imposed by a request received from the peer P4 and requesting data according to the priority level X3. And a little later or noticeably simultaneously, the peer P1 transmits to the data server SC 20*(c*b*a) blocks according to the priority level X3 (arrow F3 in FIG. 4). It will be noted that the blocks that are transmitted to the data server SC can have no value (they are in fact essentially intended to prove that the peer P1 acts in exchange for the service that was provided to it).
  • It will be noted that it is the device D of a peer Pj that can for example store in a memory the cumulated exchange values (and therefore current (or updated)) that its peer Pj possesses with respect to each other peer Pj′ of the P2P network.
  • If now a reputation type reciprocity mechanism is used in which each peer Pj is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data, then the exchange value can for example be subtracted from the current virtual monetary or confidence value of an applicant peer Pj in exchange for the reception of N blocks of data according to the first selected priority level Xk.
  • It will be understood that in this case, a peer Pj does not owe exchange to one or several other specific peers Pj′ (those from which it has requested data), but to the set of the P2P network peers. Consequently, the current virtual monetary or confidence value of a peer Pj corresponds to the accumulation of exchange values that were successively assigned to this peer Pj in exchange for all the data that were transmitted to it by the other peers Pj′ on its request, but also in exchange for all the data that it has transmitted to the other peers Pj′ on their request.
  • It is preferably the device D of a peer Pj that assigns an exchange value to its peer Pj each time that this latter (Pj) transmits data to another peer Pj′ on its request. Consequently, when a peer Pj transmits data to another peer Pj′ according to a requested priority level Xk the device D of this peer adds to the current virtual monetary or confidence value of its peer Pj an exchange value that is a function of the number of blocks of data that its peer Pj has transmitted according to this requested priority level Xk. This addition of exchange value is a sort of compensation.
  • It will also be noted that the device D of a peer Pj can also store the current virtual monetary or confidence value of each peer Pj′ with which it exchanges blocks of data (or even of its P2P network). In this case, the device D of a peer Pj, that transmits data to another peer Pj′ on its request, can assign an exchange value to this other peer Pj′ when its peer Pj transmits data to it. More specifically, it removes from the virtual monetary or confidence value of this peer Pj′ (that it stores), the exchange value that is a function of the number of blocks of data that its peer Pj transmitted to it according to the requested priority level Xk, in order to update this virtual value. Then, it can transmit to the other peers of its P2P network the virtual value that it has just updated. This is more particularly of interest when a reputation mechanism is being used.
  • It will be noted that in the presence of a specific priority level X4 for the recovery of data from the data server SC, when a peer Pj requests from the data server SC that it transmits to it N blocks of data according to the priority level X4, it can be considered that the data server SC does not proceed to this transmission except on condition that the applicant peer Pj has previously transmitted data to a predetermined item of communication equipment that is connected to the communication network R. This refinement is intended to penalise peers that would want to recover data from the data server SC too frequently. The penalty consists here in forcing a peer to consume (precious) bandwidth in transmitting data of any type, for example data of no interest, so that it can then have the right to recover data from the data server SC.
  • The predetermined communication equipment to which a peer Pj must transmit data can be the data server SC. This is practical as this enables the time necessary for the making of a decision relative to the acceptation or refusal to transmit data of the data server SC to be reduced. But, this predetermined communication equipment can also be another peer Pj′ or a dedicated server that is connected to the communication network R.
  • At least five variants can be envisaged to determine if a peer is authorized or not to recover data from the data server SC. These five variants have a common initial first step but different final second steps.
  • The first step is triggered when the data server SC receives from a peer Pj a request asking it to transmit N blocks of data according to the priority level X4. In this case, the data server SC can only proceed to this transmission on condition that the applicant peer Pj does not require this type of transmission too frequently. For example, the data server SC can maintain updated for each peer Pj the frequency according to which this peer Pj addresses data recovery requests to it. In this case, when the data server SC receives a request from a peer Pj, it compares the current frequency of this peer Pj with a selected (frequency) threshold.
  • The second step uses the result of the comparison carried out during the first step.
  • In the first variant, the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. If the current frequency of the applicant peer Pj is greater than the selected threshold, then the data server SC does not satisfy the request of the peer Pj.
  • In the second variant, the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. But, if the current frequency of the applicant peer Pj is greater than the selected threshold, then not only does the data server SC not satisfy the request of the peer Pj but in addition it requires the banishment of the applicant peer Pj from the P2P environment.
  • In the third variant, the data server SC satisfies the request of the peer Pj whatever the current frequency of this peer Pj, and, if this current frequency is greater than the selected threshold, then the data server SC requires the banishment of the applicant peer Pj from the P2P environment.
  • In the fourth variant, the data server SC only satisfies the request of the peer Pj on condition that the current frequency of this peer Pj is less than the selected threshold. But, if the current frequency of the applicant peer Pj is greater than the selected threshold, then not only does the data server SC not satisfy the request of the peer Pj but in addition it informs the other peers Pj′ of the behaviour of this applicant peer Pj so that they modify their behaviour with respect to it.
  • In the fifth variant, the data server SC satisfies the request of the peer Pj whatever the current frequency of this peer Pj, and, if this current frequency is greater than the selected threshold, then the data server SC informs the other peers Pj′ of the behaviour of this applicant peer Pj so that they modify their behaviour with respect to it.
  • It is important to note that the rules that define a reciprocity mechanism adapted according to the invention are an integral part of the communication protocol that is used to implement this reciprocity mechanism. Consequently, this reciprocity mechanism can only be attacked with great difficulty by a malicious person.
  • The invention is not restricted to embodiments of the management device, of the peer equipment and management method described above, provided only as a non-restrictive example, but includes all the variants that can be envisaged by those skilled in the art in the framework of the following claims.

Claims (14)

1. Method for managing the transmission of data in peer to peer mode between peers connected to at least one communication network, each transmission being carried out by a peer following the reception of a request from another peer, according to a selected reciprocity mechanism, wherein it consists, when a peer wants to receive from another peer N blocks of data according to a first priority level Xk selected in a set of at least two different o priority levels, in assigning to this peer an exchange value equivalent to a number M of blocks of data to transmit to at least one other peer according to a second priority level Xk′ selected in said set, M being equal to N*mkk′, where mkk′ is a predetermined value function of said first Xk and second Xk′ selected priority levels.
2. Method according to claim 1, wherein in the presence of a “tit for tat” type reciprocity mechanism, said exchange value is equal to the number M of blocks of data that said applicant peer commits to transmit to at least one other peer according to said second priority level selected Xk′ in exchange for the reception of N blocks of data according to said first priority level selected Xk.
3. Method according to claim 1, wherein in the presence of a “reputation” type reciprocity mechanism in which each peer is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data, said exchange value is subtracted from said virtual monetary or confidence value in exchange for the reception of N blocks of data according to said first selected priority level Xk.
4. Method according to claim 1, wherein said set comprises at least one high priority level X1, one normal priority level X2 and one low priority level
5. Method according to claim 4, wherein said set also comprises an additional priority level X4 associated with a transmission of blocks of data by a data server.
6. Method according to claim 5, wherein in the case of a request of a peer requesting said data server to transmit to it N blocks of data according to said additional priority level X4, said data server only proceeds to said transmission on condition that said applicant peer has previously transmitted data to a predetermined item of communication equipment connected to said communication network.
7. Method according to claim 6, wherein said predetermined communication equipment is selected in a group comprising another peer, said data server and a dedicated server connected to said communication network.
8. Device for managing transmission of data in peer to peer mode for a peer connected to at least one communication network, each transmission being carried out by said peer, following the reception of a request from another peer, according to a selected reciprocity mechanism, wherein it is arranged, when said peer wants to receive from another peer N blocks of data according to a first priority level Xk selected in a set of at least two different priority levels, to assign to this peer an exchange value equivalent to a number M of blocks of data to transmit to at least one other peer according to a second priority level Xk′ selected in said set, M being equal to N*mkk′, where mkk′ is a predetermined value function of said first Xk and second Xk′ selected priority levels.
9. Device according to claim 8, wherein it is arranged, in the presence of a “tit for tat” type reciprocity mechanism, to assign to said peer an exchange value equal to the number M of blocks of data that said applicant peer must transmit to at least one other peer according to said second priority level selected Xk′ in exchange for the reception of N blocks of data according to said first priority level selected Xk.
10. Device according to claim 8, wherein it is arranged, in the presence of a “reputation” type reciprocity mechanism in which each peer is associated with a virtual monetary or confidence value that varies over time according to its behaviour in terms of transmission of data, to subtract said exchange value from said virtual monetary or confidence value in exchange for the reception of N blocks of data according to said first selected priority level Xk.
11. Device according to claim 8, wherein it is arranged to manage a set of priority levels comprising at least one high level of priority X1, one normal level of priority X2 and one low level of priority X3.
12. Device according to claim 11, wherein it is arranged to manage a set of priority levels also comprising an additional priority level X4 associated with a transmission of blocks of data by a data server.
13. Device according to claim 12, wherein it is arranged, when said peer wants to request said data server to transmit to it N blocks of data according to said additional priority level X4, to command said peer to transmit prior to its transmission request, data to a predetermined item of communication equipment connected to said communication network.
14. Peer comprising at least one peer to peer type communication application, also comprising a device for managing transmission of data in peer to peer mode according to claim 8.
US12/658,126 2009-02-05 2010-02-03 Method for managing data transmission between peers according to levels of priority of transmitted and received data and associated management device Expired - Fee Related US8219612B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0950708 2009-02-05
FR0950708 2009-02-05

Publications (2)

Publication Number Publication Date
US20100205245A1 true US20100205245A1 (en) 2010-08-12
US8219612B2 US8219612B2 (en) 2012-07-10

Family

ID=41137106

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/658,126 Expired - Fee Related US8219612B2 (en) 2009-02-05 2010-02-03 Method for managing data transmission between peers according to levels of priority of transmitted and received data and associated management device

Country Status (5)

Country Link
US (1) US8219612B2 (en)
EP (1) EP2216965B1 (en)
JP (1) JP5676116B2 (en)
KR (1) KR101628985B1 (en)
CN (1) CN101800749B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140029625A1 (en) * 2011-04-20 2014-01-30 Freescale Semiconductor, Inc Integrated circuit device and methods for performing cut-through forwarding
WO2015065608A1 (en) * 2013-10-31 2015-05-07 Intel IP Corporation Systems, methods, and devices for efficient device-to-device channel contention
US10176012B2 (en) 2014-12-12 2019-01-08 Nxp Usa, Inc. Method and apparatus for implementing deterministic response frame transmission
US10505757B2 (en) 2014-12-12 2019-12-10 Nxp Usa, Inc. Network interface module and a method of changing network configuration parameters within a network device
US10628352B2 (en) 2016-07-19 2020-04-21 Nxp Usa, Inc. Heterogeneous multi-processor device and method of enabling coherent data access within a heterogeneous multi-processor device

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101719165B1 (en) * 2010-10-27 2017-03-23 삼성전자주식회사 METHOD AND APPARATUS FOR A TRANSMISSION/RECEPTION OF A WLAN NETWORK SHARING DATA IN A Wi-Fi P2P GROUP
JP2012160004A (en) * 2011-01-31 2012-08-23 Sony Computer Entertainment Inc Method for providing content with identifier and id management device
JP6233839B2 (en) * 2013-12-11 2017-11-22 Kddi株式会社 Data exchange method, apparatus and program
EP3258680A1 (en) * 2016-06-17 2017-12-20 Nokia Solutions and Networks Oy Multi subscription network prioritization
CN107526316B (en) * 2017-09-27 2020-06-16 四川省电科互联网加产业技术研究院有限公司 Guide display equipment monitoring system based on internet communication engine
US10715463B1 (en) 2020-02-20 2020-07-14 Robert Gelfond System and method for controlling access to resources in a multicomputer network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005113A1 (en) * 2006-06-30 2008-01-03 Microsoft Corporation Sender-driven incentive-based mass p2p file sharing
US20080140853A1 (en) * 2006-10-05 2008-06-12 David Harrison Peer-to-Peer Streaming Of Non-Live Content
US7937362B1 (en) * 2006-04-28 2011-05-03 Roxbeam Media Network Corporation System and method for facilitating a credit system in a peer-to-peer content delivery network
US7944832B2 (en) * 2006-04-21 2011-05-17 Yongmin Zhang Method and device for realizing content flowing on P2P network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100744844B1 (en) 2005-09-02 2007-08-01 배경국 Peer to peer communication Method and apparatus therefor
KR100814399B1 (en) 2006-02-22 2008-03-18 삼성전자주식회사 system and method for processing call in DiffServ based centralized controlled network
KR100806664B1 (en) 2006-04-26 2008-02-26 삼성네트웍스 주식회사 Method and apparatus for session-classed packet transmission through relay terminal in a wireless network
KR101233172B1 (en) * 2006-06-26 2013-02-15 엘지전자 주식회사 Method for data transferring through Random Access Channel

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7944832B2 (en) * 2006-04-21 2011-05-17 Yongmin Zhang Method and device for realizing content flowing on P2P network
US7937362B1 (en) * 2006-04-28 2011-05-03 Roxbeam Media Network Corporation System and method for facilitating a credit system in a peer-to-peer content delivery network
US20080005113A1 (en) * 2006-06-30 2008-01-03 Microsoft Corporation Sender-driven incentive-based mass p2p file sharing
US20080140853A1 (en) * 2006-10-05 2008-06-12 David Harrison Peer-to-Peer Streaming Of Non-Live Content

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140029625A1 (en) * 2011-04-20 2014-01-30 Freescale Semiconductor, Inc Integrated circuit device and methods for performing cut-through forwarding
US9258246B2 (en) * 2011-04-20 2016-02-09 Freescale Semiconductor, Inc Integrated circuit device and methods for performing cut-through forwarding
WO2015065608A1 (en) * 2013-10-31 2015-05-07 Intel IP Corporation Systems, methods, and devices for efficient device-to-device channel contention
US9572171B2 (en) 2013-10-31 2017-02-14 Intel IP Corporation Systems, methods, and devices for efficient device-to-device channel contention
US10176012B2 (en) 2014-12-12 2019-01-08 Nxp Usa, Inc. Method and apparatus for implementing deterministic response frame transmission
US10505757B2 (en) 2014-12-12 2019-12-10 Nxp Usa, Inc. Network interface module and a method of changing network configuration parameters within a network device
US10628352B2 (en) 2016-07-19 2020-04-21 Nxp Usa, Inc. Heterogeneous multi-processor device and method of enabling coherent data access within a heterogeneous multi-processor device

Also Published As

Publication number Publication date
CN101800749A (en) 2010-08-11
EP2216965A1 (en) 2010-08-11
KR20100090203A (en) 2010-08-13
JP5676116B2 (en) 2015-02-25
JP2010182304A (en) 2010-08-19
EP2216965B1 (en) 2015-08-12
CN101800749B (en) 2015-02-04
KR101628985B1 (en) 2016-06-09
US8219612B2 (en) 2012-07-10

Similar Documents

Publication Publication Date Title
US8219612B2 (en) Method for managing data transmission between peers according to levels of priority of transmitted and received data and associated management device
US9497035B2 (en) Method, device, and system for playing media based on P2P
US9432452B2 (en) Systems and methods for dynamic networked peer-to-peer content distribution
US8881212B2 (en) Home network management
US9756100B2 (en) Placeshifting of adaptive media streams
CN103782572A (en) System and method for providing message and event based video services control plane
CN102113296B (en) Device and method for disseminating content data between peers in a P2P mode, by using a bipartite peer overlay
Liu et al. Fast-start video delivery in future internet architectures with intra-domain caching
CN101800731A (en) Network transmission management server, network transmission management method and network transmission system
US20110239259A1 (en) Bandwidth management
US20140280701A1 (en) Distributed computing
US8787165B2 (en) Parameterized quality of service for multimedia in a coaxial network
CN103026690A (en) Confidential or protected access to a network of nodes distributed over a communication architecture with the aid of a topology server
EP2175608B1 (en) Method of transmitting data between peers with network selection
Khosroshahi et al. IPTV channel switching delay reduction through predicting subscribers’ behaviors and preferences
CN101090480A (en) Video request method, server and network added storage server
US20100094938A1 (en) Method of transmitting data between peerss by selecting a network according to at least one criterion and associated management device and communication equipment
KR20150133437A (en) Method for arranging cache positioned at subscriber network and system thereof
WO2018200096A1 (en) Integrating media content for local channels and subscription channels
KR101082786B1 (en) System and Method for Allocation of Contents using Proxy Server
WO2017215482A1 (en) Iptv multi-screen interaction implementation method and management interaction system
CN111262886A (en) Peer-to-peer network self-adaptive streaming media on-demand system and service quality guarantee method
KR102362688B1 (en) Method, transmitting server, system for providing iptv broadcasting service through heterogeneous networks
KR20130082889A (en) Content sharing server and method for performing content shaing process betweens a plurality of diveces
US20110125874A1 (en) System and method for transmitting multimedia content

Legal Events

Date Code Title Description
AS Assignment

Owner name: THOMSON LICENSING, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LE SCOUARNEC, NICOLAS;CHAMPEL, MARY-LUC;REEL/FRAME:023969/0562

Effective date: 20100201

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

AS Assignment

Owner name: MAGNOLIA LICENSING LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THOMSON LICENSING S.A.S.;REEL/FRAME:053570/0237

Effective date: 20200708

FP Lapsed due to failure to pay maintenance fee

Effective date: 20200710